Home / malwarePDF  

PWS:Win32/Dexter.A


First posted on 12 September 2013.
Source: Microsoft

Aliases :

There are no other names known for PWS:Win32/Dexter.A.

Explanation :

Threat behavior PWS:Win32/Dexter.A is a trojan that is specifically used to capture personal information, such as user names and passwords, and then send that information to a remote attacker.

Installation

When it runs, PWS:Win32/Dexter.A copies itself to c:\documents and settings\administrator\application data\uamxd\uamxd.exe. The malware modifies the following registry entry so that it runs each time you start your PC:

Adds value: "77bf0eb2-5959-4454-a6f7-23876103b968"
With data: "c:\documents and settings\administrator\application data\uamxd\uamxd.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run The malware creates the following files on your computer:

  • %windir%\assembly\nativeimages_v4.0.30319_32\temp\ae0-0\system.data.datasetextensions.dll
The malware utilizes code injection to hinder detection and removal. When PWS:Win32/Dexter.A runs, it may inject code into running processes, including the following:

  • IEXPLORE.EXE


Payload

Contacts remote host
PWS:Win32/Dexter.A may contact a remote host at 91.229.76.97 using port 80. Commonly, malware may contact a remote host for the following purposes:
  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer

This malware description was produced and published using our automated analysis system's examination of file SHA1 199a9614027684913b820f3828c75c6c47476f1e.Symptoms

System changes

The following system changes may indicate the presence of this malware:

  • The presence of the following files:

%windir%\assembly\nativeimages_v4.0.30319_32\temp\ae0-0\system.data.datasetextensions.dll
c:\documents and settings\administrator\application data\uamxd\uamxd.exe
  • The presence of the following registry modifications:
Adds value: "77bf0eb2-5959-4454-a6f7-23876103b968"
With data: "c:\documents and settings\administrator\application data\uamxd\uamxd.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Last update 12 September 2013

 

TOP